Thieves at JFK Airport Monday night netted $1.5 million in stolen iPad Minis. The heist, which the New York Post likens to the famed 1978 Lufthansa robbery depicted in the movie "Goodfellas," involved a forklift, a tractor trailer, and some lax security.

According to the Post, it was probably an inside job. Law enforcement sources say someone let the two thieves and their truck into the airport. The crooks used a forklift owned by the airport to load a pallet of iPad Minis onto their truck. They would have loaded two more pallets onto the truck had they not been confronted by an airport worker. The iPads had just been delivered for distribution to various points around the U.S.

The robbers are still at large, but law enforcement is questioning airport security personnel. The stolen iPad Minis have not yet turned up.

This isn't the first time ne'er-do-wells have lifted Apple gear in bulk. Hundreds of iPhones were stolen from a Brooklyn warehouse several years ago. Apple retail stores have been targeted by smash-and-grab crooks. iPods and iPhones have long been a favorite of street hoods.

Mobile tech is a hot item when it comes to robberies these days. In fact, the NYPD has placards scattered throughout the NYC subway system that warn passengers about the potential for smartphone thefts.

The JFK iPad Mini caper is a good reminder that mobile professionals need to take care with their mobile gear, lest it be lifted, too. Here are some tips:

1. Don't leave phones, tablets, or laptops unattended in public spaces. Just don't do it. An unattended smartphone or tablet is an easy mark for opportunists. It doesn't matter how comfortable you are with the employees of the coffee shop or restaurant, or how few people might be present. Anything can (and will!) happen when your back is turned.

2. Use 'Find My Phone' features. Most smartphones have a GPS-activated tracking service that is free. Take five minutes to turn it on and use it. This way, if your device is stolen, you have a better chance of getting it back -- and quickly. Better yet, make sure your device is set to activate an alarm once you locate it.

3. Use password locks. If your employer doesn't mandate passwords on mobile devices, shame on them. They are simple to set up, take only a few seconds to punch in, and you're in. Passwords pretty much negate the usefulness of a stolen device because the thief can't access it and steal your information.

4. Be aware of where you use mobile devices. You might think it's safe to walk down the street and scan your inbox on your smartphone, but it isn't. I know people who've had smartphones literally snatched out of their hands by crooks in broad daylight. It doesn't happen often, but it does happen.

5. Report stolen gear. If your smartphone or tablet is stolen, be sure to report it to the police and to your wireless network operator. The four largest network operators (AT&T, Sprint, T-Mobile USA, and Verizon Wireless) have set up databases for stolen phones. Once a stolen device's IMEI number is entered into the database, the device can't access any of the networks, making it useless to thieves. (The goal of this program is to dry up the demand for stolen phones).

As for the lifted iPads, it's possible that Apple can render them useless in a similar fashion. If the iPad Minis stolen were LTE-equipped models, they'll have an IMEI number just as cell phones do, and they can be prevented from accessing wireless networks. Apple can also refuse to activate the serial numbers of the stolen devices.

Time to patch your security policy to address people bringing their own mobile devices to work. Also in the new Holes In BYOD issue of Dark Reading: Metasploit creator HD Moore has five practical security tips for business travelers. (Free registration required.)

Welcome to
TechWeb, the IT professional's online resource for news coverage of the
information technology industry. We know technology news. Our mobile
and wireless news coverage moves as fast as wireless technology itself.
We follow all the devices you depend on to stay connected. Our software
coverage follows the multi-faceted software industry from every angle.
We've got a lock on network security and computer security issues.
We're all over the business of the Web--the Internet business--and the
engines that run it. We have our eyes and ears tuned to the players who
make and run the tools that tie us all together--Google, Microsoft,
eBay, Cisco, Yahoo, Oracle, Apple, Sony--and scores of others. And we
keep close tabs on the backbone of information technology, PC hardware.
We know PCs and Apple computers inside and out. We cover computer
technology, computer news, software news, search engine news, business
software, operating systems, and software development. Our coverage of
tech news includes a strong focus on the security business, its
attendant spyware and viruses, how security relates to wireless
technology and business networking and the security issues surrounding
RFID technology. We closely follow developments in Internet news and
Internet technology, including the spread of broadband and its effect
on Web browsers and the Web business. We watch the VoIP business, and
how VoIP technology is affecting the state of telephony in the
enterprise. And if all that isn't enough, we also track developments in
the IT industry that affect IT jobs, IT careers, and outsourcing.